Evasion Techniques in Pure x64 Assembly: SROP and Zero-Copy Injection

Combining SROP with Syscall 311 provides a stealthy way to load shellcode. Learn how to hide syscalls and manipulate context while surviving the debugging hell of unnoticeable opcodes.

April 13, 2026 · JM00NJ

Linux x64 Assembly: Syscalls, Registers, and the .bss Segment

Go behind the scenes of the Linux Kernel. Learn the register protocol for syscalls and why the .bss segment is essential for efficient, zero-disk memory reservation.

March 27, 2026 · JM00NJ

Building a Low-Level ICMP Sniffer in x64 Assembly (Raw Sockets)

Scapy or C are easy, but true control lies in the CPU cycles. Learn how to build a raw socket sniffer from scratch in x64 Assembly, bypassing libc for pure kernel interaction.

March 27, 2026 · JM00NJ

Linux Process Evasion: ptrace & prctl

Stop analysts in their tracks. Learn how to leverage PTRACE_TRACEME and PR_SET_DUMPABLE syscalls to harden your agents against debuggers and memory acquisition.

March 27, 2026 · JM00NJ

Solving IP Endianness in x64 Assembly: A Single-Pass Algorithm

Printing 192.168.1.5 instead of 5.1.168.192 is a common Assembly pitfall. Master a backward-build algorithm that handles Byte Order conversion without extra memory cycles.

March 27, 2026 · JM00NJ